
Summary
This detection rule identifies the creation of the 'doas.conf' file on Linux hosts. The 'doas.conf' file is specifically associated with the 'doas' utility, which provides users with the ability to execute commands with elevated privileges, similar to 'sudo'. Given the potential implications of unauthorized privilege escalation, the creation of this file is significant in identifying possible malicious activities aiming to compromise the security posture of a Linux system. The rule utilizes filesystem data from the Endpoint data model, specifically focusing on the directory path where 'doas.conf' is created, thereby providing effective detection of potentially malicious actions that could lead to full system compromise.
Categories
- Linux
- Endpoint
Data Sources
- File
ATT&CK Techniques
- T1548.003
- T1548
Created: 2024-11-13